Work Package Deliverable

  • Work Package 1 - Human and HCI Modelling

    -Summary report pdf
  • Work Package 2 - Attacks modelling and software development

    -Summary report pdf
  • Work Package 3 - Manual analysis on human behaviour related attacks

    -Task 3.1 and Task 3.2 (relatd paper is under submission)
    -Task 3.3 (related paper is under submission)
    -Task 3.4 book link
    -Summary report (work in progress)
  • Work Package 4 - Automated analysis of human behaviour related attacks

    -Task 4.1 technical report pdf
    -Task 4.2 open source software CogTool+ is hosting at CogTool+ (Will be public avaiable soon...)
    -Task 4.4 user manual and use cases pdf with code example source files
    -Summary report (work in progress)
  • Work Package 5

    -Task 5.1 outcome: Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model pdf
    -Task 5.2 outcome: Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles pdf
    -Summary report (work in progress)

Published work

  • Haiyue Yuan, Shujun Li, Patrice Rusconi, and Nouf Aljffan, 'When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems', In HCI International 2017, Vancouver, Canada.(Won best paper award) pdf
  • Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan and Mohamed Ali Kaafar. 'BehavioCog: An Observation Resistant Authentication Scheme', In International Conference of Financial Cryptography and Data Security 2017.
  • N. Williams and S. Li, "Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model," 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, 2017, pp. 1-8. pdf
  • C. Sandy, P. Rusconi and S. Li, "Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles," 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, 2017, pp. 1-8.pdf